Security

Patches

Apple slaps patch on WebKit holes in iPhones and Macs amid fears of active attacks

Two CVEs can be abused to steal sensitive info or execute code


Apple has issued emergency fixes to plug security flaws in iPhones, iPads, and Macs that may already be under attack.

The software updates for iOS, iPadOS, macOS Sonoma, and Safari web browser address two bugs: an out-of-bounds read flaw tracked as CVE-2023-42916, and a memory corruption vulnerability tracked as CVE-2023-42917

Both are in the WebKit web browser engine – the heart of Safari, as found on iThings and Macs – and can be abused to access sensitive information (CVE-2023-42916) and execute arbitrary code (CVE-2023-42917) on vulnerable devices. It appears a malicious webpage or similar content can exploit these holes: we imagine an attack would involve tricking a mark into a opening a page that then hijacks their equipment and snoops on them.

The list of affected devices is long, and includes:

"Apple is aware of a report that this issue may have been exploited," the Silicon Valley corp said about both bugs in the November 30 security update.

While we don't have details about who may have been poking code in Apple devices, and what evil deeds they were likely doing, both were found by Clément Lecigne of Google's Threat Analysis Group (TAG).

TAG keeps a close eye on nation-state espionage crews, as well as commercial spyware vendors, and some of the earlier Apple bugs have been used to deploy Pegasus and TriangleDB snooping malware on compromised phones and computers. 

In May, Cupertino fixed three other WebKit flaws under exploit that had also been spotted by Lecigne and Amnesty International. These types of bugs tend to be exploited in targeted attacks against politicians, journalists, academics, activists and others.

And also this week: Google fixed a bug in its Chrome browser that Lecigne found. This vulnerability, CVE-2023-6345, was also exploited by miscreants before Google issued the patch.

As with the Apple flaws, we don't have many details about the Chrome vulnerability, other than it's a high-severity integer overflow issue in Skia, a popular graphics library used by the browser. But if we had to bet, we'd put money on all of these being exploited by cyber snoops for espionage purposes.

So before you head into the weekend, it's probably a good idea to update everything. ®

Send us news
2 Comments

As the Apple Watch turns 10, disabled users demand real accessibility

Forget wrist acrobatics, we need smarter wake word detection and on-device voice recognition

Under pressure from Europe, Apple makes iOS browser options bit more reasonable

Cupertino quits screwing around with defaults – for those in the EU

Apple accused of hoodwinking UK antitrust cops

Mac maker denial of Safari self-preferencing called out by OWA

Netherlands fines Uber €290M for improper EU-US driver data transfers

The ride-sharing provider insists it broke no rules during the three-year legal gap

Woman uses AirTags to nab alleged parcel-pinching scum

Phew! Consumer-grade tracking devices are good for more than finding your keys and stalking

Cisco's Smart Licensing Utility flaws suggest it's pretty dumb on security

Two critical holes including hardcoded admin credential

Facebook whistleblower calls for transparency in social media, AI

Frances Haugen says navigating the digital world requires a North Star

Of course the Internet Archive’s digital lending broke the law, appeals court says

Sorry, no, you can’t just digitize, share copyrighted books without permission

31.5M invoices, contracts, patient consent forms, and more exposed to the internet

Unprotected database with 12 years of biz records yanked offline

SolarWinds left critical hardcoded credentials in its Web Help Desk product

Why go to the effort of backdooring code when devs will basically do it for you accidentally anyway

Benign bug in iOS and iPadOS crashes gizmos with just four characters

More of an Easter egg than a vuln, but a fun one to mess around with

Digital wallets can allow purchases with stolen credit cards

Researchers find it's possible to downgrade authentication checks, and shabby token refresh policies